Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/8376
Full metadata record
DC FieldValueLanguage
dc.contributor.authorYurdagül, Muhammed Ali-
dc.contributor.authorSencar, Hüsrev Taha-
dc.date.accessioned2022-01-15T13:02:42Z-
dc.date.available2022-01-15T13:02:42Z-
dc.date.issued2021-
dc.identifier.isbn978-1-7281-8934-5-
dc.identifier.urihttps://doi.org/10.1109/SPW53761.2021.00035-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/8376-
dc.description42nd IEEE Symposium on Security and Privacy (S and P) -- MAY 27, 2021 -- ELECTR NETWORKen_US
dc.description.abstractBluetooth Low Energy (FILE) has become one of the most popular wireless communication protocols and is used in billions of smart devices. Despite several security features, the hardware and software limitations of these devices makes them vulnerable to man-in-the-middle (MITM) attacks. Due to the use of these devices in increasingly diverse and safety-critical applications, the capability to detect MITM attacks has become more critical. To address this challenge. we propose the use of the response time behavior of a BLE device observed in relation to select read and write operations and introduce an active MITM attack detection system that identifies changes in response time. Our measurements on several BLE devices show that their response time behavior exhibits very high regularity, making it a very reliable attack indicator that cannot be concealed by an attacker. Test results show that our system can very accurately and quickly detect MITM attacks while requiring a simple learning approach.en_US
dc.description.sponsorshipIEEE, IEEE Comp Socen_US
dc.language.isoenen_US
dc.publisherIeee Computer Socen_US
dc.relation.ispartof2021 Ieee Symposium on Security and Privacy Workshops (Spw 2021)en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.titleBLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detectionen_US
dc.typeConference Objecten_US
dc.departmentFaculties, Faculty of Engineering, Department of Computer Engineeringen_US
dc.departmentFakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümütr_TR
dc.identifier.startpage214en_US
dc.identifier.endpage220en_US
dc.identifier.wosWOS:000697689400028en_US
dc.identifier.scopus2-s2.0-85112850609en_US
dc.institutionauthorYurdagül, Muhammed Ali-
dc.identifier.doi10.1109/SPW53761.2021.00035-
dc.authorscopusid57223014341-
dc.authorscopusid8616233200-
dc.relation.publicationcategoryDiğeren_US
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.languageiso639-1en-
item.cerifentitytypePublications-
item.openairetypeConference Object-
item.grantfulltextnone-
crisitem.author.dept02.3. Department of Computer Engineering-
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

Page view(s)

150
checked on Apr 22, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.